*Mandate the use of multi-factor authentication. Some of these techniques include using an authenticator app, phone verification, etc... | *Mandate the use of multi-factor authentication. Some of these techniques include using an authenticator app, phone verification, etc... |